Multidimensional Assessment of Emerging Technologies

Author(s):  
Ramin Neshati ◽  
Tugrul Daim

The Internet has changed the world in many ways. Online communications, financial and business-to-business transactions, electronic shopping, banking, and entertainment have become the norm in the digital age. The combined package of technologies that comprise the Internet—the information superhighway—have made all of this possible. The aging technological infrastructure that supports these webs of interconnected networks is being stressed to its performance limits. Recent advances in the backbone infrastructure that supports the Internet have helped alleviate some of these problems, but more challenges lie ahead for solving technology-related performance bottlenecks for many online applications, including high-definition interactive gaming. In this paper, the authors developed a technology assessment through multiple perspectives. While different components of the technology such as applications, protocols and network components are identified, other impact areas such as market and management are also evaluated. Elements of user behavior are evaluated within the market perspective. Evaluating technologies through these dimensions concurrently provides a balanced assessment among technical, economical, social and political factors.

Author(s):  
Ramin Neshati ◽  
Tugrul U. Daim

The Internet has changed the world in many ways. Online communications, financial and business-to-business transactions, electronic shopping, banking, and entertainment have become the norm in the digital age. The combined package of technologies that comprise the Internet—the information superhighway—have made all of this possible. The aging technological infrastructure that supports these webs of interconnected networks is being stressed to its performance limits. Recent advances in the backbone infrastructure that supports the Internet have helped alleviate some of these problems, but more challenges lie ahead for solving technology-related performance bottlenecks for many online applications, including high-definition interactive gaming. In this paper, the authors developed a technology assessment through multiple perspectives. While different components of the technology such as applications, protocols and network components are identified, other impact areas such as market and management are also evaluated. Elements of user behavior are evaluated within the market perspective. Evaluating technologies through these dimensions concurrently provides a balanced assessment among technical, economical, social and political factors.


Author(s):  
Faxin Qi ◽  
Xiangrong Tong ◽  
Lei Yu ◽  
Yingjie Wang

AbstractWith the development of the Internet and the progress of human-centered computing (HCC), the mode of man-machine collaborative work has become more and more popular. Valuable information in the Internet, such as user behavior and social labels, is often provided by users. A recommendation based on trust is an important human-computer interaction recommendation application in a social network. However, previous studies generally assume that the trust value between users is static, unable to respond to the dynamic changes of user trust and preferences in a timely manner. In fact, after receiving the recommendation, there is a difference between actual evaluation and expected evaluation which is correlated with trust value. Based on the dynamics of trust and the changing process of trust between users, this paper proposes a trust boost method through reinforcement learning. Recursive least squares (RLS) algorithm is used to learn the dynamic impact of evaluation difference on user’s trust. In addition, a reinforcement learning method Deep Q-Learning (DQN) is studied to simulate the process of learning user’s preferences and boosting trust value. Experiments indicate that our method applied to recommendation systems could respond to the changes quickly on user’s preferences. Compared with other methods, our method has better accuracy on recommendation.


Author(s):  
Laura Gatica Barrientos ◽  
Emma Rosa Cruz Sosa ◽  
Patricia E. Garcia Castro

The objective of this work, is to analyze the meaning of electronic commerce in our days taking into account the information technologies; it also will analyze their adjustments, their trends and applications of the same, in the Business to Consumer Relations (B2C), Business to Employee (B2E) and Business to Administration (B2A), Consumer to Consumer (C2C), Citizen to Government (C2G), Business to Government (B2G) and, Business to Business (B2B), as well as how information systems have been very useful to reduce costs, getting technology to change from being an operating support tool to become a strategy one, to increase the sales volume and the profits of the business as a result of this. The trend being taken by businesses and consumers has increased the participation of the companies which apply it in a comprehensive manner, since they reach international markets, while also face another kind of competition that takes place in a global market. We conclude that electronic commerce will remain a tool of great importance to efficiently manage the chains of supply between businesses and consumers through the Internet which allows an integration to reduce costs of ordering, distribution, administration and delivery of input materials.


2011 ◽  
Vol 145 ◽  
pp. 552-556 ◽  
Author(s):  
Grace C.W. Ting ◽  
Bok Min Goi ◽  
S. W. Lee

H.264/AVC is a widespread standard for high definition video (HD) for example DVD and HD videos on the internet. To prevent unauthorized modifications, video authentication can be used. In this paper, we present a cryptanalysis of a H.264/AVC video authentication scheme proposed by Saadi et al. [1] at EUSIPCO 2009. Our result will prevent situations where newer schemes are developed from the scheme thus amplifying the flaw. The designers claimed that the scheme can detect modifications on watermarked video. However, we show that an attacker can modify the watermarked video and compute a valid watermark such that the recipient will retrieve a watermark from the modified watermarked video that will match what the recipient computes during video authentication check. Thus, the recipient will think the tampered video is authentic. The first main problem of the scheme is its use of hash functions for watermark generation. Since hash functions are public functions not depending on any secret, the attacker can modify the watermarked video and feed this through the hash function to compute a new watermark. The second problem is that it is possible for the attacker to perform watermark embedding thus producing a modified watermarked video. On receiving the modified video, the recipient recomputes the watermark and compares this with the watermark extracted from the video. They will match because the embedded watermark and recomputed watermark use the same hash function based watermark generation and the same input i.e. the modified video. Our cryptanalysis strategy applies to any watermarking based video authentication scheme where the watermark and embedding are not functions of secrets. As countermeasure, the functions should be designed so that only legitimate parties can perform them. We present two improved schemes that solve this problem based on private key signing functions and message authentication functions respectively.


Author(s):  
Ronan McIvor ◽  
Paul Humphreys

This chapter examines the implications of business-to-business (B2B) commerce for the buyer-supplier interface. Innovations in electronic commerce have a key role to play in managing inter-organizational networks of supply chain members. The evidence presented in this chapter illustrates that the Internet represents a powerful technology for commerce and communication at the buyer-supplier interface. Internet technologies are having a considerable impact on the communication patterns at the buyer-supplier interface. It is shown how electronic commerce technologies have the potential to create competitive advantage through radically changing the structure and interaction patterns at the buyer-supplier interface. The chapter identifies a number of areas where electronic commerce technologies can make a contribution to the creation of competitive advantage. While the Internet offers ways for organizations to communicate and trade more effectively with their suppliers, and gives consumers higher levels of service and sophistication, it also poses major challenges to those within organizations who have to manage it. It is argued that closed network problems and the nature of buyer-supplier relations present major impediments to electronic commerce achieving its full strategic potential at the buyer-supplier interface.


Author(s):  
Ramanjit Singh

Wikipedia is a free encyclopedia that operates worldwide on the Internet. Articles on Wikipedia are developed with close collaboration of volunteers and anyone can edit the content (Wikipedia, 2006e). Although there are many advantages of using Wikipedia as a group collaboration tool, there are important implications. First, Wikipedia community is diverse and intercultural differences can distort the communication process. Second, the neutral point of view (NPOV) policy can lead to disputes. Third, lack of supervision and open source policy can be another source of conflict. Forth, administration of articles can be complex due to differing cultural and political stand points (Smith & Kollock, 1999). Laslty, differences in time and space as well as low level of access to the Internet can significantly impede collaboration efforts at Wikipedia (Berry, 2006; Madon, 2000; Parayil, 2006; Sahay, Nicholson, & Krishna, 2003). Hence, the aim of this paper is to examine sociocultural implications of using Wikipedia as a group collaboration tool spanning multiple countries and how social and cultural climate, differences in time and space, as well as technological infrastructure of countries affect collaboration between individuals given the distinctive operational and administration policies at Wikipedia. It is believed that findings from this research will increase the awareness of the underlying cause of many disputes arising at Wikipedia. In addition, this research will lead to cultural relativism and provide neutral grounds for collaborative efforts at Wikipedia in the future.


2011 ◽  
pp. 1656-1663
Author(s):  
Norm Archer

Information systems that link businesses for the purpose of inter-organizational transfer of business transaction information (inter-organizational information systems, or IOIS) have been in use since the 1970s (Lankford & Riggs, 1996). Early systems relied on private networks, using electronic data interchange (EDI) or United Nations EDIFACT standards for format and content of transaction messages. Due to their cost and complexity, the use of these systems was confined primarily to large companies, but low-cost Internet commercialization has led to much more widespread adoption of IOIS. Systems using the Internet and the World Wide Web are commonly referred to as B2B (business-to-business) systems, supporting B2B electronic commerce.


2011 ◽  
pp. 9-15
Author(s):  
Robert J. Mockler ◽  
Dorothy G. Dologite ◽  
Marc E. Gartenfeld

Every organization can be viewed from two perspectives. There are external processes such as procurement and sales, and internal processes such as management and operations, finance, marketing, and human resources. This article primarily focuses on external, commercial e-business processes. B2B (business-to-business) e-business is the sale of products or services, or information exchange, among two or more businesses through electronic technology, usually involving the Internet, through a public or private exchange. The following background section gives a very brief general overview of B2B e-business history. In the main thrust of this article, we discuss making the B2B decision by examining key B2B business requirements and benefits, as well as describing basic approaches to B2B e-business implementation. In the subsequent section, the article provides a future outlook for e-business.


Author(s):  
M. José Garrido ◽  
Ana Gutiérrez ◽  
Rebeca San José

The Internet is used by firm purchasers as a source of information in procurement. We propose a model of the determinants and consequences of Internet use in this process. We analyzed whether different Internet tools are used throughout all purchasing phases and whether the characteristics of the buying situation determined the use of the Internet in that process. We also proposed to analyze how Internet use in this process impacts companies from two different points of view: organizational and economical. Organizational consequences refer to the buying center structure in terms of size, participation, number of hierarchical levels, and functional areas. Economical consequences refer to purchase results in terms of efficacy and efficiency. Implications for business-to-business marketers and researchers are discussed.


Sign in / Sign up

Export Citation Format

Share Document